EH Chapter 13: Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

20 Terms

1
New cards

With a rotation of 4, what does erwaiv decrypt to?

answer

2
New cards

What do you call a message before it is encrypted?

Plain text

3
New cards

What does PGP use to verify identity?

Web of trust

4
New cards

What principle is used to demonstrate that a signed message came from the owner of the key that signed it?

Nonrepudiation

5
New cards

What is Diffie‐Hellman used for?

Key exchange

6
New cards

How did 3DES improve on DES?

Used three keys

7
New cards

What improvement does elliptic curve cryptography make?

Smaller keys improve speed

8
New cards

What is it called when two different data sets yield the same cryptographic hash?

Collision

9
New cards

Which of the following terms can be used in a description of asymmetric key encryption?

Public key

10
New cards

If Alice were to send an email to Bob, what key would she use to encrypt the message?

Public key

11
New cards

What property allows you to trust someone trusted by a certificate authority you trust?

Transitive property

12
New cards

Why is symmetric key encryption typically used over asymmetric key encryption?

It's faster.

13
New cards

What is it called when both symmetric and asymmetric keys are used?

Hybrid cryptosystem

14
New cards

What is MD5 or SHA‐1 commonly used for in cryptography?

Message authentication code (MAC)

15
New cards

What type of encryption does PGP use?

Asymmetric key

16
New cards

What tool would you use to identify ciphersuites in use on a web server?

sslscan

17
New cards

How does AES protect against related‐key attacks?

Implementation doesn't allow related keys

18
New cards

What is one advantage of using a certificate authority?

Trusted third party doing validation

19
New cards

How does a certificate authority keep a list of valid certificates up‐to‐date?

Certificate revocation lists

20
New cards

What security property suggests that an email signed by an individual's key must have come from that person?

Nonrepudiation